Hussein Al-Bahadili
Hussein Al-Bahadili received his B.Sc degree in Engineering from College of Engineering (University of Baghdad, Iraq) in 1986. He received his M.Sc and PhD degrees in Engineering from Queen Mary College (University of London, UK) in 1988 and 1991, respectively. His field of study was parallel computers. He is currently working as an Associate Professor at Petra University, Jordan. He is a visiting researcher at the Wireless Networks and Communications Centre (WNCC) at the University of Brunel, UK. He is also a visiting researcher at the School of Engineering, University of Surrey, UK. He has published many papers and book chapters in different fields of science and engineering in numerous leading scholarly and practitioner journals, books, and presented at leading world-level scholarly conferences. His research interests include parallel and distributed computing, wireless communications, computer networks, cryptography and network security, data compression, image processing, and artificial intelligence and expert systems.
Publications
 |
Ghassan Issa, Shakir M. Hussain, Hussein Al-Bahadili.
© 2015. 13 pages.
In an effort to enhance the learning process in higher education, a new model for Competition-Based Learning (CBL) is presented. The new model utilizes two well-known learning...
|
 |
Hussein Al-Bahadili.
© 2015. 19 pages.
Wireless ad hoc networks are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for...
|
 |
Hussein Al-Bahadili, Azmi Halasa.
© 2014. 18 pages.
In a Mobile Ad Hoc Network (MANET), a mobile node consumes its power in message communication, message processing, and other operation missions. The amount of power a mobile node...
|
 |
Ghassan Issa, Shakir M. Hussain, Hussein Al-Bahadili.
© 2014. 13 pages.
In an effort to enhance the learning process in higher education, a new model for Competition-Based Learning (CBL) is presented. The new model utilizes two well-known learning...
|
 |
Hussein Al-Bahadili, Alia Sabri.
© 2013. 17 pages.
In mobile ad hoc networks (MANETs), broadcasting is widely used in route discovery and other network services. The most widely used broadcasting algorithm is simple flooding...
|
 |
Hussein Al-Bahadili, Saif Al-Saab.
© 2013. 19 pages.
In this paper, the authors present a description of a new Web search engine model, the compressed index-query (CIQ) Web search engine model. This model incorporates two bit-level...
|
 |
Ali H. Hadi, Hussein Al-Bahadili.
© 2013. 22 pages.
This chapter presents the detail description of a Port-Knocking (PK) technique, which should avert all types of port attacks and meets all other network security requirements....
|
 |
Hussein Al-Bahadili, Shakir M. Hussain, Ghassan F. Issa, Khaled El-Zayyat.
© 2013. 21 pages.
A Mobile Ad Hoc Network (MANET) suffers from high packet-loss due to various transmission impairments, such as: wireless signal attenuation, free space loss, thermal noise...
|
 |
Hussein Al-Bahadili, Awad Al-Sabbah, Mohammed Abu Arqoub.
© 2013. 19 pages.
Cloud Computing IT infrastructure has the potential to be particularly suitable for collaborative commerce (c-commerce) applications; because it generally requires less efforts...
|
 |
Hussein Al-Bahadili.
© 2012. 581 pages.
Computer networks have become essential to the survival of businesses, organizations, and educational institutions, as the number of network users, services, and applications has...
|
 |
Hussein Al-Bahadili, Alia Sabri.
© 2012. 20 pages.
In the current dynamic probabilistic algorithm, the retransmission probability (pt) has always been formulated as a linear/non-linear function of a single variable, namely, the...
|
 |
Hussein Al-Bahadili, Azmi Halasa.
© 2012. 18 pages.
In a Mobile Ad Hoc Network (MANET), a mobile node consumes its power in message communication, message processing, and other operation missions. The amount of power a mobile node...
|
 |
Hussein Al-Bahadili, Abdel Rahman Alzoubaidi, Ali Al-Khalidi.
© 2012. 20 pages.
Dynamic (reactive or on-demand) routing protocols used in wireless ad hoc networks suffer from transmitting a huge number of control packets during the route discovery phase of...
|
 |
Hussein Al-Bahadili, Haitham Y. Adarbah.
© 2012. 27 pages.
The Transport Control Protocol (TCP) is the dominant transport layer protocol in the Internet Protocol (IP) suite, as it carries a significant amount of the Internet traffic...
|
 |
Hussein Al-Bahadili, Shakir M. Hussain, Ghassan F. Issa, Khaled El-Zayyat.
© 2012. 21 pages.
A Mobile Ad Hoc Network (MANET) suffers from high packet-loss due to various transmission impairments, such as: wireless signal attenuation, free space loss, thermal noise...
|
 |
Ali H. Hadi, Hussein Al-Bahadili.
© 2012. 22 pages.
This chapter presents the detail description of a Port-Knocking (PK) technique, which should avert all types of port attacks and meets all other network security requirements....
|
 |
Hussein Al-Bahadili, Ali Maqousi, Reyadh S. Naoum.
© 2012. 14 pages.
The location-aided routing scheme 1 (LAR-1) and probabilistic algorithms are combined together into a new algorithm for route discovery in mobile ad hoc networks (MANETs) called...
|
 |
Hussein Al-Bahadili, Alia Sabri.
© 2011. 16 pages.
In mobile ad hoc networks (MANETs), broadcasting is widely used in route discovery and other network services. The most widely used broadcasting algorithm is simple flooding...
|
 |
Hussein Al-Bahadili, Saif Al-Saab.
© 2011. 18 pages.
In this paper, the authors present a description of a new Web search engine model, the compressed index-query (CIQ) Web search engine model. This model incorporates two bit-level...
|